Online Banking and Data Security begins with YOU!
The Internet offers the potential for safe, convenient ways to shop and conduct banking banking business, any day, any time. However, safe banking online involves making good choices – decisions that will help you avoid costly surprises or even scams.
PLEASE NOTE: Midland National Bank will never request private or confidential information or ask you to verify such information through email. Please report such requests to the bank or to local law enforcement authorities.
Don't Get "Phished"!
Have you received e-mail with a similar message to these?
“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”
“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
It’s a scam called “phishing”—and it involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims. Read about phishing scams and how to protect yourself.
Be Wary of "Urgent" Text Messages
A new scam involves a text message sent to cellphones and smartphones warning bank customers that their debit card or credit card has been blocked for security reasons. The message urges users to call a 'hotline" to unblock their card, but instead they reach an automated response system asking for the card number, PIN and other information.
Always stop and think before giving personal information in response to an unsolicited request, especially ones marked as "urgent", no matter who the source supposedly is. Always communicate with your bank using telephone numbers or e-mail addresses you are certain about. Midland National Bank will never ask you to provide PIN numbers or other private information via e-mail or text.
If you provide the requested information, you may find yourself a victim of identity theft.
Like many other scams, phishing preys upon the unwary. Here are a few tips that will help you fight back against this form of electronic fraud.
The Department of Justice advises e-mail users to “stop, look and call” if they receive a suspicious e-mail.
If you think you have been “phished” immediately contact your financial institution as well as the three major credit bureaus and ask that a fraud alert be placed on your credit report. Contact information for the credit bureaus is shown above
Please keep these tips in mind for managing your accounts and safeguarding your funds from unauthorized transfers by criminals. Criminals may use a consumer's account information to create a demand draft (sometimes called a "remotely created check") drawn on the consumer's account, or to make an electronic transfer from the consumer's account.
Here are some effective ways to protect yourself:
Protect Your Identity
With all the abovementioned security measures in place, maximum security is possible only with your help. Below are a few tips to you help reduce the threat of identity theft:
Be Aware of Smartphone Security Threats
Just about everyone has a smartphone. The exploding popularity of these devices, along with the constant release of new models and features makes them exciting and useful, both to users…and to the bad guys. Three threats to be aware of:
By far the most popular smartphones are either iPhone or Google Android based devices. Both of these vendors offer marketplaces to go download and purchase new apps or programs for the phone. This makes it possible to extend and add new games and functionality to the phone without ever having to touch a PC. However, what many people don’t realize is that it is fairly easy for hackers to pose as a software company and make apps available on these marketplaces that look just like the other legitimate apps. Just because it is on the marketplace doesn’t mean it is necessarily safe. Take a close look at who is offering it, and beware of “free” versions of apps you normally have to pay for. Malicious apps can take over your phone, steal your data, or send text messages to “premium service” numbers, which automatically adds charges to your monthly bill.
Most smartphones have permission systems that allow you to control what an app can access and do on your phone. Whenever you download a new app, don’t just hit “accept” when it is asking for permissions. Have a look at what it is asking for access to. Even legitimate free apps often pay for themselves by pillaging your phone for information they can sell to marketers. Chances are that free poker game isn’t asking for access to your GPS location, contact list, and browsing history just to let you play a game of cards.
QR Codes are those little square barcodes you can find just about anywhere from magazines to product packaging to store ads. Many phones allow you to snap a picture of these codes to be taken to a website displaying information about whatever you are looking at. Just remember that while these can save you time and can be handy, it is the equivalent to clicking a link to a website and having no idea where you are going. It could open your browser to information about that new movie, or it could be taking you to a malicious website trying to install malware on your phone. Your best bet is always to just go to the proper website yourself, that way you know for sure what site you will be pulling up.
Hackers want access to your information and your money, so whether it is a desktop, laptop or smartphone, if it can give them what they need, they will be trying to get on it. So when the bad guys want on your smartphone, there is probably an app for that too.
What to do if you fall victim to Identity Theft
The internet is a great tool for information and for conducting online business, as long as consumers take the appropriate. The consumer information links below can assist consumers in locating information and providing guidance on how to file complaints when appropriate.